Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent
|
|
- Eugenia Holt
- 8 years ago
- Views:
Transcription
1 Attacking a Swarm with a Band of Liars evaluating the impact of attacks on BitTorrent Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha PIPCA Programa de Pós-Graduação em Computação Aplicada Universidade do Vale do Rio dos Sinos (UNISINOS) São Leopoldo, RS Brasil Galway, Sept th IEEE International Conference on P2P
2 Introduction Context: BitTorrent In P2P, file sharing seems to be the killer application BitTorrent is one of the most popular instances of file sharing Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do2 Vale / 31 do
3 Introduction Motivation & Related Work Research efforts have investigated BitTorrent To understand its behavior, expose potential limitations and propose improvements P2P fairness issues and incentive mechanisms There are several attacks reported in the literature But always in peer s self-benefit, like avoiding any contribution to the network In contrast, we emphasize security aspects a malicious peer wants damage to a swarm Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do3 Vale / 31 do
4 Introduction Motivation & Related Work Research efforts have investigated BitTorrent To understand its behavior, expose potential limitations and propose improvements P2P fairness issues and incentive mechanisms There are several attacks reported in the literature But always in peer s self-benefit, like avoiding any contribution to the network In contrast, we emphasize security aspects a malicious peer wants damage to a swarm Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do3 Vale / 31 do
5 Introduction Our Aims in This Paper Identification of attacks exploiting vulnerabilities of the BitTorrent protocol Evaluation of their impact Two specific attacks addressed: piece lying and Eclipse Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do4 Vale / 31 do
6 Rest of the Talk Introduction 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do5 Vale / 31 do
7 Outline BitTorrent 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do6 Vale / 31 do
8 BitTorrent Main Elements.torrent file Trackers Seeders Leechers Swarm Pieces Blocks Bitfields Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do7 Vale / 31 do
9 BitTorrent Policies and Strategies Connection policies: peer obtains peer IPs from the tracker and maintains a number of connections with other peers Tit-for-tat: incentive mechanism to increase collaboration Local Rarest First (LRF): peer selects for download the piece that looks rarest Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do8 Vale / 31 do
10 State Diagrams 1/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do9 Vale / 31 do
11 State Diagrams 2/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 10 Vale / 31 do
12 State Diagrams 3/3 BitTorrent Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 11 Vale / 31 do
13 Outline Attack and Subversion Strategies 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 12 Vale / 31 do
14 Attack and Subversion Strategies Attack and Subversion Strategies Sybil attack: single physical peer with multiple virtual identities Piece lying Peer eclipsing Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 13 Vale / 31 do
15 Attack and Subversion Strategies Piece Lying Attack LRF aims to equalize the number of copies of each piece in the swarm Attack aims to interfere with this balance Malicious peer lies about having one or more pieces, but never unchokes other peers Many peers acting in collusion and lying about certain pieces induce the non-malicious peers to choose other pieces first This tends to make certain pieces artificially rarer When pieces become less common, it may slow down the swarm or even cause a swarm failure Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 14 Vale / 31 do
16 Attack and Subversion Strategies Peer Eclipse Attack In BitTorrent each peer usually connects to a limited number of peers A malicious peer does not collaborate (or might collaborate very little) Malicious peers connect to correct peers (and are connected by correct peers) The list of peers a correct peer knows about is randomly taken from trackers, and there will be malicious and correct peers If a correct peer is connected to malicious peers only, then it is Eclipsed It makes no progress and eventually fails Even if there are some correct peers connected, the download will take longer or even fail if peers leave Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 15 Vale / 31 do
17 Outline BitTorrent Simulation 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 16 Vale / 31 do
18 Basic Aspects BitTorrent Simulation Studied the protocol specification, implementations and the literature Created a simulation model of a swarm Reflects the detailed behavior of peers Extension of a simulation framework called Simmcast (written in Java) Modeled elements and input parameters: number and type of peers, the way they arrive to the swarm, bandwidth, contribution rate, and so on Assumptions: single tracker, no detailed TCP modeling Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 17 Vale / 31 do
19 BitTorrent Simulation Is the Simulator any Real? SImulation results produced without attack were consistent with measurements reported in the literature matched experimental results obtained from a small, controlled environment experimented with different content sizes, piece size in blocks, bandwidth, and number of peers Packets were collected using passive monitoring Results showed similarity Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 18 Vale / 31 do
20 Outline Impact Evaluation 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 19 Vale / 31 do
21 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do
22 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do
23 Questions Posed Impact Evaluation 1 What is the impact of the Piece Lying attack on the dynamics of a swarm, when compared to the case without attack? 2 What happens when the number of liars increases? 3 In the Eclipse attack, which number of Sybils is more effective and why? Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 20 Vale / 31 do
24 Impact Evaluation Model Parameters and Assumptions Analysis focused on the first hours of a swarm 1 initial seeder 100 leechers that arrive following Exponential distribution Contribution rate equals 1.0 for leecher and 2.0 for seeder Reconnection between peer and tracker at every 30s Shared content 640MB = 640 pieces of 1MB, each with of 64 blocks of 16 KB Leechers have a maximum download time (10x average time) Asymmetric bandwidths: download 1 Mbps and upload 256 Kbps Malicious peers act in collusion and start the attack at the same moment (on 5th peer) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 21 Vale / 31 do
25 Impact Evaluation Swarm with Normal Behavior 100 Seeders Leechers Remaining L max =59 Peers S max = Time (minutes) L max = maximum number of leechers reached S max = maximum number of seeders reached Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 22 Vale / 31 do
26 Impact Evaluation Evaluation Metrics Increase in download time Number of download failures (as users give up) Complete swarm failure Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 23 Vale / 31 do
27 Impact Evaluation Impact of the Piece Lying attack? 25 liars lying about 4 pieces 100 Seeders Leechers Remaining 100 Seeders Leechers Remaining L max =77 60 L max =59 60 Peers Peers S max =10 20 S max = Time (minutes) Time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 24 Vale / 31 do
28 Impact Evaluation What happens when the number of liars increases? Peers lying about a set of 32 pieces Number of Downloads Completed Liars 1 Liars 5 Liars Liars 15 Liars 20 Liars 25 Liars Liars 75 Liars 100 Liars Download time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 25 Vale / 31 do
29 Impact Evaluation In Eclipse, which number of Sybils is more efficient? Varying the number of Sybils connecting randomly Number of Downloads Completed Sybils 10 Sybils Sybils 25 Sybils 30 Sybils Sybils 50 Sybils 60 Sybils Sybils 80 Sybils 90 Sybils 100 Sybils Sybils 300 Sybils 400 Sybils Sybils 600 Sybils 1000 Sybils Download time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 26 Vale / 31 do
30 Impact Evaluation Impact of Eclipse Example depicts swarm under attack of a gang of 50 Sybils 100 Seeders Leechers Remaining L max =95 Seeders Leechers Remaining L max =59 60 Peers Peers S max =10 10 S max = Time (minutes) Time (minutes) Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 27 Vale / 31 do
31 Outline Concluding Remarks 1 BitTorrent 2 Attack and Subversion Strategies 3 BitTorrent Simulation 4 Impact Evaluation 5 Concluding Remarks Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 28 Vale / 31 do
32 Concluding Remarks Conclusions Novelty is to address security in BitTorrent in the sense of causing harm Presented a simulation evaluation of the impact of two attacks Discrete-event simulator produced results were compared with experimental data Results indicate that a modest set of resources can be used to launch an attack and harm a BitTorrent network Attack of piece lying seems effective with 50 or more liars in the configuration evaluated Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 29 Vale / 31 do
33 Concluding Remarks Future Work There are many opportunities for future work There are other relevant attacks and security issues Impact of attacks needs to be evaluated with large scale simulations Experimental evaluation of attacks with different user agents to validate results Project, implementation and evaluation of counter-measures Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 30 Vale / 31 do
34 Concluding Remarks Contatcts Thank you. Prof. Marinho P. Barcellos or marinho P2P-SeC: Secure and reliable Computing in P2P networks PIPCA/UNISINOS Brazil Marinho P. Barcellos - P2P-SeC - UNISINOS ( PIPCA Programa Attacking de BitTorrent Pós-Graduação em Computação Aplicada Universidade do 31 Vale / 31 do
The BitTorrent Protocol
The BitTorrent Protocol Taken from http://www.cs.uiowa.edu/~ghosh/bittorrent.ppt What is BitTorrent? Efficient content distribution system using file swarming. Usually does not perform all the functions
More informationLecture 6 Content Distribution and BitTorrent
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Lecture 6 Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent
More informationPeer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
More informationEvaluating the Effectiveness of a BitTorrent-driven DDoS Attack
Evaluating the Effectiveness of a BitTorrent-driven DDoS Attack Jurand Nogiec University of Illinois Fausto Paredes University of Illinois Joana Trindade University of Illinois 1. Introduction BitTorrent
More informationSE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S.
BitTorrent Technology How and why it works SE4C03: Computer Networks and Computer Security Last revised: April 03 2005 Name: Nicholas Lake Student Number: 0046314 For: S. Kartik Krishnan 1 Abstract BitTorrent
More informationCNT5106C Project Description
Last Updated: 1/30/2015 12:48 PM CNT5106C Project Description Project Overview In this project, you are asked to write a P2P file sharing software similar to BitTorrent. You can complete the project in
More informationIncentives Build Robustness in BitTorrent
Incentives Build Robustness in BitTorrent Bram Cohen bram@bitconjurer.org May 22, 2003 Abstract The BitTorrent file distribution system uses tit-fortat as a method of seeking pareto efficiency. It achieves
More informationModeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent
IEEE P2P'9 - Sept. 9-, 29 Modeling and Analysis of Bandwidth-Inhomogeneous Swarms in BitTorrent M. Meulpolder, J.A. Pouwelse, D.H.J. Epema, H.J. Sips Parallel and Distributed Systems Group Department of
More informationJava Bit Torrent Client
Java Bit Torrent Client Hemapani Perera, Eran Chinthaka {hperera, echintha}@cs.indiana.edu Computer Science Department Indiana University Introduction World-wide-web, WWW, is designed to access and download
More informationThe Internet is Flat: A brief history of networking over the next ten years. Don Towsley UMass - Amherst
The Internet is Flat: A brief history of networking over the next ten years Don Towsley UMass - Amherst 1 What does flat mean? The World Is Flat. A Brief History of the Twenty-First Century, Thomas Friedman
More informationSeminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent
Seminar RVS MC-FTP (Multicast File Transfer Protocol): Simulation and Comparison with BitTorrent Dominic Papritz Universität Bern Overview > Related work > MC-FTP > BitTorrent > Future work > References
More informationDDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia kcsia@cs.ucla.edu Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
More informationPeer-to-peer filetransfer protocols and IPv6. János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004
-to-peer filetransfer protocols and IPv6 János Mohácsi NIIF/HUNGARNET TF-NGN meeting, 1/Oct/2004 Motivation IPv6 traffic is
More informationP2P File Sharing: BitTorrent in Detail
ELT-53206 Peer-to-Peer Networks P2P File Sharing: BitTorrent in Detail Mathieu Devos Tampere University of Technology Department of Electronics & Communications Engineering mathieu.devos@tut.fi TG406 2
More informationA Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
More informationThe Algorithm of Sharing Incomplete Data in Decentralized P2P
IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 2007 149 The Algorithm of Sharing Incomplete Data in Decentralized P2P Jin-Wook Seo, Dong-Kyun Kim, Hyun-Chul Kim,
More informationGuaranteeing Performance through Fairness in Peer-to-Peer File-Sharing and Streaming Systems. Alex Sherman
Guaranteeing Performance through Fairness in Peer-to-Peer File-Sharing and Streaming Systems Alex Sherman Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in
More informationTraffic Localization for DHT-based BitTorrent networks
Traffic Localization for DHT-based BitTorrent networks Moritz Steiner and Matteo Varvello 1 OUTLINE Motivation DHT Traffic Localization DHT Traffic Localization in Action! Evaluation Conclusion Motivation
More informationBITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC
BITSTALKER: ACCURATELY AND EFFICIENTLY MONITORING BITTORRENT TRAFFIC Kevin Bauer, Damon McCoy, Dirk Grunwald, and Douglas Sicker University of Colorado, Boulder, CO, USA {bauerk, mccoyd, grunwald, sicker}@colorado.edu
More informationBitTorrent Peer To Peer File Sharing
BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start
More informationHow To Predict Bittorrent Eta
University of Warsaw Faculty of Mathematics, Computer Science and Mechanics VU University Amsterdam Faculty of Sciences Joint Master of Science Programme Piotr Powałowski Student no. 209403 (UW), 1735543
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationP2P: centralized directory (Napster s Approach)
P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application
More informationRevisiting P2P content sharing in wireless ad hoc networks
Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications
More informationNetwork Management through BitTorrent Blocking and Bandwidth Shaping by ISPs
Network Management through BitTorrent Blocking and Bandwidth Shaping by ISPs Gerard Van Wijk Department of Computer Science University of Minnesota, Morris Morris, MN 56267 vanw0067@morris.umn.edu ABSTRACT
More informationPEER-TO-PEER NETWORK
PEER-TO-PEER NETWORK February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
More informationTrust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:
Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks
More informationOn the Development of IETF-based Network Monitoring Probes for High Speed Networks
On the Development of IETF-based Network Monitoring Probes for High Speed Networks Ricardo Nabinger Sanchez rnsanchez@cscience.org Rodrigo Pereira rspereira@exatas.unisinos.br Luciano Paschoal Gaspary
More informationChunkSim: Simulating Peer-to-Peer Content Distribution
ChunkSim: Simulating Peer-to-Peer Content Distribution Jussi Kangasharju Uwe Schmidt Dirk Bradler Julian Schröder-Bernhardi Department of Computer Science, Darmstadt University of Technology Hochschulstrasse
More informationGraffiti Networks: A Subversive, Internet-Scale File Sharing Model. Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009
Graffiti Networks: A Subversive, Internet-Scale File Sharing Model Andrew Pavlo DC401 Rhode Island Defcon Group October 12, 2009 Co-Authors Ning Shi (Brown) Outline Open BitTorrent Problems A Subversive
More informationDelft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis
Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl
More informationPeer-to-Peer Data Management
Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 11. Content Distribution 1. Reliability in Distributed
More informationCS5412: TORRENTS AND TIT-FOR-TAT
1 CS5412: TORRENTS AND TIT-FOR-TAT Lecture VI Ken Birman BitTorrent 2 Today we ll be focusing on BitTorrent The technology really has three aspects A standard tht BitTorrent client systems follow Some
More informationMultimedia transmission in a managed P2P network: making sense?
Multimedia transmission in a managed P2P network: making sense? L. Xu 1, A. Ksentini 2, K. Singh 1, G. Rubino 1, G. Straub 3, Y. L Azou 4 1 INRIA Rennes - Bretagne Atlantique, Rennes, France; 2 IRISA-University
More informationShould Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis, UC Riverside Pablo Rodriguez, Microsoft Research Cambridge Konstantina Papagiannaki, Intel Research Cambridge
More informationMitigation of Random Query String DoS via Gossip
Mitigation of Random Query String DoS via Gossip Stefano Ferretti, Vittorio Ghini Department of Computer Science, University of Bologna Bologna, Italy {sferrett, ghini}@cs.unibo.it arxiv:9.v2 [cs.cr] 2
More informationMC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with
MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent RVS Seminar HS 2007 MC-FTP (Multicast File Transfer Protocol): Implementation and Comparison with BitTorrent Alican
More informationBotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks Karim El Defrawy, Minas Gjoka and Athina Markopoulou University of California, Irvine {keldefra, mgjoka, athina}@uci.edu Abstract BitTorrent is currently
More informationRatFish: A File Sharing Protocol Provably Secure Against Rational Users
RatFish: A File Sharing Protocol Provably Secure Against Rational Users Michael Backes 1,2, Oana Ciobotaru 1, and Anton Krohmer 1 1 Saarland University 2 MPI-SWS Abstract. The proliferation of P2P computing
More informationP2P File Sharing - A Model For Fairness Versus Performance
1 The Design Trade-offs of BitTorrent-like File Sharing Protocols Bin Fan John C.S. Lui Dah-Ming Chiu Abstract The BitTorrent (BT) file sharing protocol is very popular due to its scalability property
More informationP2P content sharing in spontaneous multi-hop wireless networks
P2P content sharing in spontaneous multi-hop wireless networks Mohamed Karim Sbai EPI Planete, INRIA, France Email: mksbai@sophia.inria.fr Emna Salhi EPI Planete, INRIA, France ENSI, Tunisia Email: esalhi@sophia.inria.fr
More informationApplications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationDenial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
More informationA CASE STUDY IN MODELING LARGE-SCALE PEER-TO-PEER FILE-SHARING NETWORKS USING DISCRETE-EVENT SIMULATION
A CASE STUDY IN MODELING LARGE-SCALE PEER-TO-PEER FILE-SHARING NETWORKS USING DISCRETE-EVENT SIMULATION Christopher D. Carothers Ryan LaFortune Department of Computer Science Rensselaer Polytechnic Institute
More informationA Measurement Study of Peer-to-Peer File Sharing Systems
CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University
More informationDepartment of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationUniversity of Würzburg, Institute of Computer Science, Research Report Series
University of Würzburg Institute of Computer Science Research Report Series Investigation of chunk selection strategies in peer-assisted video-on-demand systems Tobias Hoßfeld, Simon Oechsner, Frank Lehrieder,
More informationComputation and Economics - Spring 2012 Assignment #3: File Sharing
Computation and Economics - Spring 2012 Assignment #3: File Sharing Professor Sven Seuken Department of Informatics, University of Zurich Out Thursday, March 8, 2012 Due 14:00 sharp: Monday, March 19,
More informationReducing Costs in the Personal Cloud: Is BitTorrent a Better Bet?
Reducing Costs in the Personal Cloud: Is BitTorrent a Better Bet? Rahma Chaabouni, Marc Sánchez-Artigas and Pedro García-ópez Universitat Rovira i Virgili, Tarragona (Spain) {rahma.chaabouni marc.sanchez
More informationA Week in the Life of the Most Popular BitTorrent Swarms
A Week in the Life of the Most Popular BitTorrent Swarms Mark Scanlon, Alan Hannaway and Mohand-Tahar Kechadi 1 UCD Centre for Cybercrime Investigation, School of Computer Science & Informatics, University
More informationPeer-to-Peer Multimedia Streaming Using BitTorrent
Peer-to-Peer Multimedia Streaming Using BitTorrent Purvi Shah Jehan-François Pâris Department of Computer Science University of Houston, Houston, TX 77204-3010 {purvi, paris}@cs.uh.edu Abstract We propose
More informationThe Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
More informationThe Impact of Background Network Traffic on Foreground Network Traffic
The Impact of Background Network Traffic on Foreground Network Traffic George Nychis Information Networking Institute Carnegie Mellon University gnychis@cmu.edu Daniel R. Licata Computer Science Department
More information3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
More informationHow To Make A Game Of Gnutella A Cooperative Game
CS 186 Lecture 3 P2P File-Sharing David C. Parkes Sven Seuken September 1, 2011 Imagine you need to distribute a software patch to 10 Million users. What s an efficient way for doing so? If you are using
More informationTorrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System
Torrage: A Secure BitTorrent based Peer-to-Peer Distributed Storage System Debarghya Das Cornell University, Ithaca, NY 14850 dd367@cornell.edu Abstract Most cloud storage platforms today offer a centralized
More informationAngels: In-Network Support for Minimum Distribution Time in P2P Overlays
Angels: In-Network Support for Minimum Distribution Time in P2P Overlays Raymond Sweha remos@cs.bu.edu Azer Bestavros best@cs.bu.edu John Byers byers@cs.bu.edu Abstract This paper proposes the use of in-network
More informationHow To Accelerate Peer To Peer File Sharing With Social Networks
The 3st Annual IEEE International Conference on Computer Communications: Mini-Conference Accelerating Peer-to-Peer File Sharing with Social Relations: Potentials and Challenges Haiyang Wang Email: hwa7@cs.sfu.ca
More informationLeveraging the Clouds for improving P2P Content Distribution Networks Performance
Leveraging the Clouds for improving P2P Content Distribution Networks Performance amir@sics.se 1 Big Picture 2 Big Picture Client Server Peer to Peer Server Farm 3 Big Picture How to leverage the cloud
More informationBotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks KarimEl Defrawy, MinasGjokaand AthinaMarkopoulou University of California, Irvine {keldefra, mgjoka, athina}@uci.edu Abstract BitTorrent is currently
More informationLab 5: BitTorrent Client Implementation
Lab 5: BitTorrent Client Implementation Due: Nov. 30th at 11:59 PM Milestone: Nov. 19th during Lab Overview In this lab, you and your lab parterner will develop a basic BitTorrent client that can, at minimal,
More informationMethodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary
Methodology: Security plan for wireless networks By: Stephen Blair Mandeville A. Summary The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but
More informationarxiv:1011.1892v1 [cs.ni] 8 Nov 2010
Pushing Locality to the Limit Stevens Le Blond a, Arnaud Legout a,, Walid Dabbous a a INRIA, EPI Planete, 004 route des lucioles, B.P. 93, 0690 Sophia Antipolis CEDEX, France arxiv:0.89v [cs.ni] 8 Nov
More informationDenial of Service Resilience in Peer to Peer. D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik
Denial of Service Resilience in Peer to Peer File Sharing Systems D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, W. Zwaenepoel Presented by: Ahmet Canik Outline 1. Background on P2P systems 2. File
More informationMODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
More informationShould Internet Service Providers Fear Peer-Assisted Content Distribution?
Should Internet Service Providers Fear Peer-Assisted Content Distribution? Thomas Karagiannis U.C. Riverside Pablo Rodriguez Microsoft Research Konstantina Papagiannaki Intel Research Cambridge Abstract
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationSEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: KALBARCZ@ILLINOIS.EDU UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
More informationContent Distribution Network (CDN)
Content Distribution Network (CDN) Amir H. Payberah (amir@sics.se) Fatemeh Rahimian (fatemeh@sics.se) 1 GOAL What is Content Distribution Network (CDN)? The solutions for CDN. CDN applications File Sharing
More informationComprehensive View of a Live Network Coding P2P System
Comprehensive View of a Live Network Coding P2P System Christos Gkantsidis chrisgk@microsoft.com John Miller johnmil@microsoft.com Microsoft Research 7 J J Thomson Avenue Cambridge, CB3 FB. UK Pablo Rodriguez
More informationIs Content Publishing in BitTorrent Altruistic or Profit-Driven?
Is Content Publishing in BitTorrent Altruistic or Profit-Driven? Ruben Cuevas Univ. Carlos III de Madrid rcuevas@it.uc3m.es Sebastian Kaune TU Darmstadt kaune@kom.tu-darmstadt.de Michal Kryczka Institute
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationMULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
More informationA Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems
A Reputation Management and Selection Advisor Schemes for Peer-to-Peer Systems Loubna Mekouar, Youssef Iraqi, and Raouf Boutaba University of Waterloo, Waterloo, Canada {lmekouar, iraqi, rboutaba}@bbcr.uwaterloo.ca
More informationHow To Test The Speed Of Bittorrent On A Bitt Client And Torrent On A Pc Or Ipad (For Free) On A Microsoft Flash Get 2.5 (For A Free) Computer (For Pc Or Mac) On An Ip
Zhicheng Yang, yangzhicheng@wustl.edu (A paper written under the guidance of Prof. Raj Jain) Download The file distribution protocol BitTorrent(BT) is very popular nowadays, and people are used to sharing
More informationANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY. Department of Computer Science & IT University of Jammu, Jammu
ANALYSIS OF SOFTWARE THREATS AND SOFTWARE SECURITY Dr. Deepshikha Jamwal Bhawana Sharma Research Scholar Research scholar jamwal.shivani@gmail.com bhawana32_mca@yahoo.co.in Department of Computer Science
More informationDoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationChapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
More informationINTERNET CONNECTIVITY
INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationDDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,
More informationPerformance Analysis Proposal
1. Title Performance Analysis Proposal Performance Analysis of P2P VoIP Applications 2. Objective To evaluate the dynamic behavior (i.e., CODEC usage) of VoIP P2P applications (e.g. Skype, Google Talk)
More informationNetwork Management Practices 11/01/2012 1
Atlantic Broadband s High Speed Internet Network Management, Service Performance and Terms of Service Pursuant to the Federal Communications Commission s newly enacted Open Internet Rules found in Part
More informationOne hop Reputations for Peer to Peer File Sharing Workloads
One hop Reputations for Peer to Peer File Sharing Workloads Michael Piatek Tomas Isdal Arvind Krishnamurthy Thomas Anderson University of Washington Abstract An emerging paradigm in peer-to-peer (P2P)
More informationapt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates
apt-p2p: A Peer-to-Peer Distribution System for Software Package Releases and Updates authors: Cameron Dale, Jiangchuan Liu presented by: Cameron Dale Simon Fraser University Burnaby, BC, Canada camerond@cs.sfu.ca
More informationAbout Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
More informationTk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
More informationTCP Behavior across Multihop Wireless Networks and the Wired Internet
TCP Behavior across Multihop Wireless Networks and the Wired Internet Kaixin Xu, Sang Bae, Mario Gerla, Sungwook Lee Computer Science Department University of California, Los Angeles, CA 90095 (xkx, sbae,
More informationOn the impact of the initial peer list in P2P live streaming applications: the case of Sopcast
Universal Journal of Communications and Network 1(4): 142-15, 213 DOI: 1.13189/ujcn.213.143 http://www.hrpub.org On the impact of the initial peer list in P2P live streaming applications: the case of Sopcast
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationSOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationProtocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
More informationStress Testing and Distributed Denial of Service Testing of Network Infrastructures
Faculty of Electrical Engineering and Communication Brno University of Technology Technická 12, CZ-616 00 Brno, Czechia http://www.six.feec.vutbr.cz Stress Testing and Distributed Denial of Service Testing
More informationMulti-torrent: a performance study and applications. Yan Yang*, Alix L.H. Chow and Leana Golubchik. Int. J. Advanced Media and Communication, Vol.
Int. J. Advanced Media and Communication, Vol. Multi-torrent: a performance study and applications Yan Yang*, Alix L.H. Chow and Leana Golubchik Department of Computer Science, University of Southern California,
More informationSonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
More informationEnergy Adaptive Mechanism for P2P File Sharing Protocols
Energy Adaptive Mechanism for P2P File Sharing Protocols Mayank Raj 1, Krishna Kant 2, and Sajal K. Das 1 1 Center for Research in Wireless Mobility and Networking (CReWMaN), Department of Computer Science
More information